Read all of our news, articles, reviews, and more in our company blog
The idea of collecting data from logs and using this data for analyzing the behavior of software applications, endpoints and servers dates back to the 80s. It took over a decade for the first Security Information and Event Management (SIEM) systems to appear as an on-premise security tool that collects logs from multiple collection points to detect abnormal activity.
It's April, and that means it's Records and Information Management Month. While it's not the sexiest topic, maintaining and organizing your business's records is an essential task that often gets put on the back burner.
Is cyber insurance the silver bullet to cover your organization from an attack? What lies within the fine print of a cyber insurance policy? These questions posed along with important considerations when choosing how to implement cyber security insurance properly.